Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
BUSINESS B2 Ethics.
Organizing Your Argument The Argumentative Essay.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
FERPA: WHAT YOU SHOULD KNOW ILASFAA April 18, 2008 Amy Perrin Director of Financial Aid Elgin Community College.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
Right to Privacy: The Unwritten Right
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Ethical Behavior 7-12 Conforming to moral standards or conforming to standards of conduct of profession or group Conforming to moral standards or conforming.
Business Plug-In B7 Ethics.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Chapter 14: Ethics, Justice and Fair Treatment at Work
INTERNET and CODE OF CONDUCT
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Per Anders Eriksson
DEED WorkForce Center Reception and Resource Area Certification Program Module 2 Unit 1b: WorkForce Center System II Learning Objectives III.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
1 Lecture 2: Whistle-Blowing Please refer to “Ethics and the Conduct of Business” by John R. Boatright BBA 361 BBA 361 Business Ethics & Corporate Governance.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Family Educational Rights and Privacy Act. From the moment a child enters the school system, sensitive information is collected about the child (and even.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
Privacy & Confidentiality
As defined in the Generally Accepted Privacy Principles, “privacy” refers to the rights and obligations of individuals and organizations with respect to.
Chapter 7 Impact of Information Technology. Agenda Shneiderman’s Plagues of the Information era Ethics Issues Corporate Code of IT Ethics Other Impacts.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Chapter 39 THIRD PERSONS IN AGENCY. 2 The relationship of employer and employee is created by the agreement of the parties and is subject to contract.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Fundamentals of Human Resource Management, 10/e, DeCenzo/Robbins Chapter 4, slide 1 Chapter 3 Employee Rights and Discipline.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
Comprehensive Volume, 18 th Edition Chapter 41: Regulation of Employment.
Data protection—training materials [Name and details of speaker]
The Medical College of Georgia HIPAA Privacy Rule Orientation.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Ethics and the Conduct of Business
FERPA Family Educational Rights and Privacy Act
PRIVACY AND SECURITY (CCI410) PERTEMUAN 5 IR. NIZIRWAN ANWAR, MT
Obligations of Educational Agencies: Parents’ Bill of Rights
Legal and Ethical Issues in E-Commerce
Service Organization Control (SOC)
Move this to online module slides 11-56
Employee Privacy and Privacy of Employee Information
Introduction to Health Privacy
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Advertisers’ Deception
INFS 452 – Computer Ethics & Society
Presentation transcript:

Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John R. Boatright

Employee Privacy  Company collects employees information and data for hiring, placement, evaluation performance, and compensation purposes.  Basic personal data, i.e. race, sex, age and handicap status  Workplace monitoring:  Computer record about number of phone calls, duration, destination, keystrokes by a data processor to test duration of being away from the desk…..Employers claim to improve employees well- being, avoid employee theft, drugs…etc.  Psychological Testing  Used to predict successful job performance and identify potential dishonest and troublesome employees.

Consumer Privacy  The use of information gathered in the database marketing.  Record of consumers preference, direct mailing to them  One arguable consumer privacy issue is whether it is ethical to reveal information of customers to the direct marketer

Definitions of Privacy  1 st Protect privacy of private life from unwanted publicity: “the right to be let alone—the most comprehensive of rights and the right most valued by civilized men”  2 nd Control over information about ourselves: “Privacy is the claim of individuals…to determine for themselves when, how, and to what extent information about them is communicated to others.”  3 rd Certain facts about a person are not known by others: “the condition of not having undocumented personal knowledge about one possessed by others”

Few issues to be concerned  The kind of information to be collected  The use to which the information is put  The persons in a company who have access to the information  The disclosure of information to persons outside the company  The means used to gain the information  The steps taken to ensure the accuracy and completeness of the information  The access that employees have to information about themselves

Justifying Purpose:  The first three issues can be justified by the PURPOSE of collecting the data.  E.g Maintaining medical records on employees for administer benefit plans, then: 1.medical information that is essential for this purpose can be collected 2.Only persons who are responsible for administering the benefit plan or monitoring employee health are justified to access to the information 3.These persons must use the information only for the intended purpose

Justifying Purpose:  E.g Maintaining medical records on employees for administer benefit plans, then: 1.medical information that is essential for this purpose can be collected 2.Only persons who are responsible for administering the benefit plan are justified to access to the information 3.These persons must use the information only for the intended purpose Therefore: Privacy will be violated if:  Personal information is gathered without a sufficient justifying purpose  Persons who are not in a position know the information  Persons who are in such position use the information for other purposes.

Disclosure to Outsiders Disclosure of personal information to persons outside a company. E.G employer disclose content of personal files to landlords, lending agencies without consent of the employees involved. Sometimes even if it is for the legitimate purpose, employers may not have the right to provide employees information, because the employer is justified in collecting and using information for connecting employer-employee relationship, not for other purpose.

The Means used to Gather Information Use of some means may violate and employee’s right of privacy, such as polygraph testing since these means tend to collect more information than needed. Hidden cameras/ploygraph testing is intrusive because employees are deprived of chances to exercise control over how they appear to others, which is essential for being an autonomous individual.

The Means used to Gather Information Less intrusive means of gathering information are preferred e.g. seeking information about drug use by employees in the workplace are not justified by searching lockers and desks, hidden cameras in restroom, random drug tests, etc, when sufficient information can be gathered by closer observation of work performance, etc.

Accuracy, Completeness and Access The last two issues concerns with fairness matters. Employers maintain inaccurate or incomplete files and deny employees access to them are not invading privacy of employees but violate a right of fair treatment.  Not a possession of personal information matter by its use in ways which are unfair to employees. Polygraph machines are unreliable as only body responses but not mental experience being tested.

Information Collection Consumers may feel a lack of privacy when browsing Internet nowadays Some argue that there is no privacy in Internet, because it is a public arena and being online is like walking and talking in town square. Privacy is defined as control over personal information. Is information on Internet owned by us?

Protecting Privacy on Internet Five principles on Internet privacy suggested by Federal Trade Commission: 1.Notice/Awareness: 1.Notice/Awareness: Disclose the identity of the collecting party, means for collection, use of such information. Should be displayed and easily understood in homepage. 2.Choice/Consent: 2.Choice/Consent: Provide a choice whether to allow information to be collected. 3.Access/Participation: 3.Access/Participation: Allow consumers access to information collected and opportunity to contest the accuracy or completeness of the data.

Protecting Privacy on Internet Five principles on Internet privacy suggested by Federal Trade Commission: 4.Integrity/Security: 4.Integrity/Security: Inform users of the steps taken to protect against the alteration, misappropriation, or destruction of data and action that will be taken for a breach of security. 5.Enforcement/Redress: 5.Enforcement/Redress: Assure consumers that the company follows responsible information practices and consequence for failing to do so. Others: Inform employees whether cookies are used by some websites to track or modify their interaction with the website based on information sent by their internet browser to the server on which the website is located.

Is Private? 1. messages are accessible only with a password know to the users. Computer may belong to company but not the contents. 2.Employers may claim a right to monitor employees’ messages to ensure that system is not being misused. 3.Some privacy experts contend that employers have a right to read employees’ if they announce the policy in advance, while others believe that reading s in company is always wrong, even if employees are put on notice.

Conclusion Ethically Managing employees information: 1.Specify the purpose of collection of data, how to collect and who will administer/access the personal data. These persons must use the information only for the intended purpose 2.Storage of information: (I) Employees personal data should be stored with high security. Such as only be accessed by authorized persons, and if it is stored in computer, personal information should be password- protected. Persons assigned to administer personal data need to strictly adhere to the regulation of relevant privacy protection.

Conclusion Ethically Managing employees information: 3.Give employees right to access their personal information: Employees should be given the right to access to and correct personal data at any time.

Conclusion Ethically Managing employees information: 4.Disclosure of information: (i)inform employees in advance about the disclosure and reason for using such personal data; (ii) inform employees how their personal data be stored, how the company can review, change and delete the personal data collected/stored; (iii) give employees option to choose whether to disclose their data (iv)not disclose employee information to any third party, except to those company related parties; only for purposes stated when collecting personal data; and not to disclose the information to others without consent of employees.